Explore chapters and articles related to this topic
A Novel Flexible Framework for Rapidly Integrating Offline Experiment into Remote Laboratory System
Published in Ning Wang, Qianlong Lan, Xuemin Chen, Gangbing Song, Hamid Parsaei, Development of a Remote Laboratory for Engineering Education, 2020
Ning Wang, Qianlong Lan, Xuemin Chen, Gangbing Song, Hamid Parsaei
To implement an efficient middleware for supporting high-performance real-time data transmission between experimental hardware and end users, a stable web engine must be chosen. With the development of the Internet of Things (IoT) technology, Node.js, which is known as its speed, scalability, and efficiency, plays the key role with the capability of the reliant on the implementation of the data-intensive applications and the real-time applications [129–131]. With these advantages, it has become a prime candidate for implementation of RL system. Node.js is a web engine that works in the server side, and is designed to notably set up web server for writing scalable Internet real-time communication applications [132]. Node.js uses an event-driven operation mode, asynchronous I/O port to minimize overhead and maximize scalability. The original goal of Node.js is to create web sites with push capabilities as seen in web applications like Gmail [133]. Nevertheless unlike most other JavaScript programs, Node.js is not executed in a web browser. Instead, it is executed as a server-side JavaScript application. In the server, Node.js not only implements multiple common JavaScript specifications but also provides a Read Eval Print Loop (REPL) environment for interactive testing [134]. Comparing with Apache web engine, Node.js is an especially fast and efficient web engine which is more suitable to handle the high-performance real-time data transmission.
Building Applications with HTML
Published in Steven Morris, Anthony Smith-Chaigneau, Interactive TV Standards, 2012
Steven Morris, Anthony Smith-Chaigneau
The ability of ECMAScript applications to extend their code at runtime has been restricted for security reasons. Depending on the permissions assigned to an application, this has implications for the following elements. Use of the eval() functionString constructors for Function objectsSetting event handlersModification of script elements using DOMUse of the Window.setTimeout() DOM functionUse of the Document.write() DOM function
Chapter 19: Symbolic and Numerical Solutions of ODES with Maple
Published in Andrei D. Polyanin, Valentin F. Zaitsev, Handbook of Ordinary Differential Equations, 2017
Andrei D. Polyanin, Valentin F. Zaitsev
1. eval (rhs (So11), x = i), evaluating y(x) on a set of points of the interval [- 10,10] (with the predefined function eval); e.g., the result at the point x = - 10 reads: 12e-50πe122erf22-14πe122-erf5I2+22-erf-5I2+22e-50. $$ \frac{1}{2}e^{{ - 50}} \sqrt \pi e^{{\frac{1}{2}}} \sqrt 2 {\text{erf}}\left( {\frac{{\sqrt 2 }}{2}} \right) - \frac{1}{4}\sqrt \pi e^{{\frac{1}{2}\sqrt 2 }} \left( { - {\text{erf}}\left( {5I\sqrt 2 + \frac{{\sqrt 2 }}{2}} \right) - {\text{erf}}\left( { - 5I\sqrt 2 + \frac{{\sqrt 2 }}{2}} \right)} \right)e^{{ - 50}} . $$
An Efficient QGA-based Model for Resource Allocation in D2D Communication for 5G-HCRAN Networks
Published in IETE Journal of Research, 2023
Nittu Goutham, Pavan Kumar Mishra
Update population: All the q-bit individuals in Q(k) are updated using Q-gate. Among M Q-bits, the ith Q-bit (here i = 1,2, … , N) is updated as Here are the updated values, is the adjustable angle that converges to either 0 or 1 state and its value are chosen from Table 3. The angle of is chosen based on the Q-bit location; if it is located in the first and third quadrants, its value is positive, and if it is located in the second and fourth quadrants, its value is negative here based on the value of it converges the problem early. Therefore, based on the problem formulation, we considered as positive 0.70106 and as negative 0.70106 and the remaining angle as 0. Eval f(x) > Eval f(b) means if the evaluation fitness function of the current solution is greater than the local best fitness value stored in b(k), then modify the q-bit accordingly.
Pyrolysis and combustion behavior of few high-ash Indian coals
Published in International Journal of Coal Preparation and Utilization, 2022
Gaurav Raghuvanshi, Prasenjeet Chakraborty, Bodhisatwa Hazra, Ashis K. Adak, Pradeep K. Singh, Ashok K. Singh, Vivek Singh
It was also observed that as the heating rates increase, the DSC and DTG curves were shifted toward the higher temperature intervals and hence the Tpeaks and burnout temperatures increased. The results were in agreement with results from other researchers (Jayaraman, Kok, and Gokalp 2017; Wang et al. 2017). Zheng and Kozinski (2000) and Ghetti, Ricca, and Angelini (1996) also documented that the Rmax (maximum rate of mass loss) and height of the DTG peak curve to be proportional to their relative reactivity. Our studied coal samples have also shown that CP-64 is the most reactive coal as its DTG curve and Rmax were observed to be maximum compared to other coals at the heating rates of 10°C and 15°C/min. However, when the heating rate was kept at 5°C/min, the sample CP-65 was observed to become more reactive as its Rmax also increased. However, such methods can only be use for comparison as the peak curves only show the relative reactivity but not the actual reactivity. The decomposition of siderite and organic matter occurred in the same temperature range (300°C to 500°C) and may have enhanced the reactivity of the sample CP-64 (Mendez et al. 2003). The Rock-Eval results presented in the next section, further supports the above statement, showing the decomposition of siderite and organic matter at similar temperatures during pyrolysis. Inspite of having a significant proportion of mineral composition, the burnout temperature for this sample was lower, which might be due to its lower thermal maturity level and presence of the reactive macerals (77.9 vol. %, mmf) in a larger amount (Crelling et al. 1992).
Divide-and-conquer checkpointing for arbitrary programs with no user annotation
Published in Optimization Methods and Software, 2018
Jeffrey Mark Siskind, Barak A. Pearlmutter
We start by formulating a simple evaluator for this core language (Figure 9) and extend it to perform AD and ultimately divide-and-conquer checkpointing. This evaluator is written in what is known in the programming-language community as direct style, where functions (in this case , denoting ‘eval’ and , denoting ‘apply’) take inputs as function-call arguments and yield outputs as function-call return values [18]. While this evaluator can be viewed as an interpreter, it is intended more as a description of the evaluation mechanism; this mechanism could be the underlying hardware as exposed via a compiler. Indeed, as described below in Section 3.14, we have written three implementations, one an interpreter, one a hybrid compiler/interpreter, and one a compiler.